رکورد قبلیرکورد بعدی

" Autonomous cyber deception : "


Document Type : BL
Record Number : 859681
Main Entry : Al-Shaer, Ehab S.,1967-
Title & Author : Autonomous cyber deception : : reasoning, adaptive planning, and evaluation of HoneyThings /\ Ehab Al-Shaer, Jinpeng Wei, Kevin W. Hamlen, Cliff Wang.
Publication Statement : Cham, Switzerland :: Springer,, 2019.
Page. NO : 1 online resource (xvi, 235 pages) :: illustrations (some color)
ISBN : 3030021092
: : 3030021106
: : 3030021114
: : 9783030021092
: : 9783030021108
: : 9783030021115
: 9783030021092
Contents : 1 Using Deep Learning to Generate Relational HoneyData.- 2 Towards Intelligent Cyber Deception Systems.- 3 Honeypot Deception Tactics.- 4 Modeling and Analysis of Deception Games based on Hypergame Theory.- 5 Dynamic Bayesian Games for Adversarial and Defensive Cyber Deception.- 6 CONCEAL: A Strategy Composition for Resilient Cyber Deception -- Framework, Metrics and Deployment.- 7 NetShifter -- A Comprehensive Multi-Dimensional Network Obfuscation and Deception Solution.- 8 Deception-Enhanced Threat Sensing for Resilient Intrusion Detection.- 9 HONEYSCOPE: IoT Device Protection with Deceptive Network Views.- 10 gExtractor: Automated Extraction of Malware Deception Parameters for Autonomous Cyber Deception.- 11 Malware Deception with Automatic Analysis and Generation of HoneyResource.
Abstract : This textbook surveys the knowledge base in automated and resilient cyber deception. It features four major parts: cyber deception reasoning frameworks, dynamic decision-making for cyber deception, network-based deception, and malware deception. An important distinguishing characteristic of this book is its inclusion of student exercises at the end of each chapter. Exercises include technical problems, short-answer discussion questions, or hands-on lab exercises, organized at a range of difficulties from easy to advanced, . This is a useful textbook for a wide range of classes and degree levels within the security arena and other related topics. It?s also suitable for researchers and practitioners with a variety of cyber security backgrounds from novice to experienced.
Subject : Computer networks-- Security measures.
Subject : Computer security.
Subject : Computer networks-- Security measures.
Subject : Computer security.
Dewey Classification : ‭005.8‬
LC Classification : ‭QA76.9.A25‬
Added Entry : Hamlen, Kevin
: Wang, Cliff
: Wei, Jinpeng
کپی لینک

پیشنهاد خرید
پیوستها
Search result is zero
نظرسنجی
نظرسنجی منابع دیجیتال

1 - آیا از کیفیت منابع دیجیتال راضی هستید؟